So, I was thinking several months ago, reading articles and reports of malicious activity, and we all know that hackers take steps to obscure their identities and locations. I wanted to ask about some of the methods used, In general, I would assume that tor would be an obvious choice, as well as routing traffic through compromised machines. is this a fairly accurate portrayal of modern techniques?

The word you're looking for is "Anonymity", beside of what you have mentioned, there are various other techniques: (HTTP Proxies, VPNs, SSH Tunneling...etc). For me, I would look at it like this; there are different techniques, each is suitable for a certain situation, ignoring the fact that whether those are old or modern techniques, it does not really matter as long as you accomplish your goal.

Last edited by ZeroOne on Fri Jul 20, 2012 3:30 pm, edited 1 time in total.

sternone wrote:No you don't... you can pay with bitcoins and be totally anonymous.. I know people who don't keep logs of their clients connections at al..

Hey I don't know nothing!! I ONLY HEARD ABOUT IT !!!

Whilst I agree with you, it's probably worth mentioning that bitcoins aren't inherently anonymous. You would still need to take additional measures such as those you've already mentioned for example, or others to ensure you remain anonymous.